In the Linux kernel, the following vulnerability has been resolved:
drm/sprd: fix potential NULL dereference
'drm' could be null in sprddrmshutdown, and drm_warn maybe dereference it, remove this warning log.
v1 -> v2: - Split checking platformgetresource() return value to a separate patch - Use dev_warn() instead of removing the warning log
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49125.json",
"cna_assigner": "Linux"
}[
{
"signature_version": "v1",
"id": "CVE-2022-49125-1d46fb88",
"target": {
"function": "sprd_drm_shutdown",
"file": "drivers/gpu/drm/sprd/sprd_drm.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3acc8db1bc221604e2db9807f01d8a44b97a64d",
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "84835965054708465247229825582843553481",
"length": 189.0
}
},
{
"signature_version": "v1",
"id": "CVE-2022-49125-3f5cf599",
"target": {
"file": "drivers/gpu/drm/sprd/sprd_drm.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3acc8db1bc221604e2db9807f01d8a44b97a64d",
"signature_type": "Line",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"48924270294978516835487035471235780628",
"323851340792490967531812642435551498742",
"75588603742230432871577522658887897358",
"125798057076219069202271475178523732402"
]
}
},
{
"signature_version": "v1",
"id": "CVE-2022-49125-88ed6311",
"target": {
"function": "sprd_drm_shutdown",
"file": "drivers/gpu/drm/sprd/sprd_drm.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8668658aebb0a19d877d5a81c004baf716c4aaa6",
"signature_type": "Function",
"deprecated": false,
"digest": {
"function_hash": "84835965054708465247229825582843553481",
"length": 189.0
}
},
{
"signature_version": "v1",
"id": "CVE-2022-49125-a9f60468",
"target": {
"file": "drivers/gpu/drm/sprd/sprd_drm.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8668658aebb0a19d877d5a81c004baf716c4aaa6",
"signature_type": "Line",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"48924270294978516835487035471235780628",
"323851340792490967531812642435551498742",
"75588603742230432871577522658887897358",
"125798057076219069202271475178523732402"
]
}
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49125.json"